23522
23522
23522
https://ebookfinal.com
https://ebookfinal.com/download/building-the-
infrastructure-for-cloud-security-1st-ed-edition-
raghuram-yeluri/
https://ebookfinal.com/download/securing-the-cloud-cloud-computer-
security-techniques-and-tactics-1st-edition-graham-speake/
ebookfinal.com
https://ebookfinal.com/download/resource-optimization-and-security-
for-cloud-services-1st-edition-kaiqi-xiong/
ebookfinal.com
https://ebookfinal.com/download/cryptography-for-security-and-privacy-
in-cloud-computing-1st-edition-stefan-rass/
ebookfinal.com
https://ebookfinal.com/download/veerappan-the-untold-story-1st-
edition-sunaad-raghuram/
ebookfinal.com
https://ebookfinal.com/download/handbook-of-research-on-security-
considerations-in-cloud-computing-1st-edition-munir/
ebookfinal.com
Building the Infrastructure for Cloud Security 1st ed.
Edition Raghuram Yeluri Digital Instant Download
Author(s): Raghuram Yeluri, Enrique Castro-Leon
ISBN(s): 9781430261452, 1430261455
Edition: 1st ed.
File Details: PDF, 8.54 MB
Year: 2014
Language: english
www.it-ebooks.info
For your convenience Apress has placed some of the front
matter material after the index. Please use the Bookmarks
and Contents at a Glance links to access them.
www.it-ebooks.info
Contents at a Glance
Index���������������������������������������������������������������������������������������������� 211
www.it-ebooks.info
Introduction
xxiii
www.it-ebooks.info
■ Introduction
taking care of the server’s housekeeping functions. This provides a solid platform on
which to run software: the hypervisor environment and operating systems. Each software
component is “measured” initially and verified against a “known good” with the root
of trust anchored in the hardware trust chain, thereby providing a trusted platform to
launch applications.
We assume that readers are already familiar with cloud technology and are
interested in a deeper exploration of security aspects. We’ll cover some cloud technology
principles, primarily with the purpose of establishing a vocabulary from which to build a
discussion of security topics (offered here with no tutorial intent). Our goal is to discuss
the principles of cloud security, the challenges companies face as they move into the
cloud, and the infrastructure requirements to address security requirements. The content
is intended for a technical audience and provides architectural, design, and code samples
as needed to show how to provision and deploy trusted clouds. While documentation
for low-level technology components such as trusted platform modules and the
basics of secure boot is not difficult to find from vendor specifications, the contextual
perspective—a usage-centric approach describing how the different components are
integrated into trusted virtualized platforms—has been missing from the literature. This
book is a first attempt at filling this gap through actual proof of concept implementations
and a few initial commercial implementations. The implementation of secure platforms is
an emerging and fast evolving issue. This is not a definitive treatment by a long measure,
and trying to compile one at this early juncture would be unrealistic. Timeliness is a
more pressing consideration, and the authors hope that this material will stimulate the
curiosity of the reader and encourage the community to replicate the results, leading to
new deployments and, in the process, advancing the state of the art.
There are three key trends impacting security in the enterprise and cloud
data centers:
• The evolution of IT architectures. This is pertinent especially with
the adoption of virtualization and now cloud computing.
Multi-tenancy and consolidation are driving significant
operational efficiencies, enabling multiple lines of business
and tenants to share the infrastructure. This consolidation and
co-tenancy provide a new dimension and attack vector.
How do you ensure the same level of security and control
in an infrastructure that is not owned and operated by
you? Outsourcing, cross-business, and cross-supply chain
collaboration are breaking through the perimeter of traditional
security models. These new models are blurring the distinction
between data “inside” an organization and that which exists
“outside” of those boundaries. The data itself is the new perimeter.
xxiv
www.it-ebooks.info
■ Introduction
xxv
www.it-ebooks.info
■ Introduction
Intel has been hard at work with its partners and as fellow travelers in providing
comprehensive solution architectures and a cohesive set of products to not only address
these questions but also deploy e solutions in private clouds, public clouds at scale.
This book brings together the contributions of various Intel technologists, architects,
engineers, and marketing and solution development managers, as well as a few key
architects from our partners.
The book has roughly four parts:
• Chapters 1 and 2 cover the context of cloud computing and the
idea of security, introducing the concept of trusted clouds. They
discuss the key usage models to enable and instantiate the trusted
infrastructure, which is a foundational for those trusted clouds.
Additionally, these chapters cover the use-models with solution
architectures and component exposition.
• Chapters 3, 4, and 5 cover use-cases, solution architectures, and
technology components for enabling the trusted infrastructure,
with emphasis on trusted compute, the role of attestation, and
attestation solutions, as well as geo-fencing and boundary control
in the cloud.
• Chapters 6 and 7 provide an interesting view of identity
management and control in the cloud, as well as network security
in the cloud.
• Chapter 8 extends the notion of trust to the virtual machines
and workloads, with reference architecture and components
built on top of the trusted compute pools discussed in earlier
chapters. Then, Chapter 9 provides a comprehensive exposition
of secure cloud bursting reference architecture and a real-world
implementation that brings together all the concepts and usages
discussed in the preceeding chapters.
These chapters take us on a rewarding journey. Starting with a set of basic technology
ingredients rooted in hardware, namely the ability to carry out the secure launch of
programs; not just software programs, but also implemented in firmware in server
platforms: the BIOS and the system firmware. We have also added other platform sensors
and devices to the mix, such as TPMs, location sensors. Eventually it will be possible
integrate information from other security related telemetry in the platform: encryption
accelerators, secure random generators for keys, secure containers, compression
accelerators, and other related entities.
With a hardened platform defined it now becomes possible to extend the scope of
the initial set of security features to cloud environments. We extend the initial capability
for boot integrity and protection to the next goal of data protection during its complete
life cycle: data at rest, in motion and during execution. Our initial focus is on the server
platform side. In practical terms we use an approach similar to building a mathematical
system, starting with a small set of assertions or axioms and slowly extending the
scope of the assertions until the scope becomes useful for cloud deployments. On the
compute side we extend the notion of protected boot to hypervisors and operating
xxvi
www.it-ebooks.info
■ Introduction
systems running on bare metal followed by the virtual machines running on top of the
hypervisors. Given the intense need in the industry secure platforms, we hope this need
will motivate application vendors and system integrators to extend this chain of trust all
the way to application points of consumption.
The next abstraction beyond trust established by secure boot is to measure the level
of trust for applications running in the platform. This leads to a discussion on attestation
and frameworks and processes to accomplish attestation. Beyond that there are a
number of practical functions needed in working deployments, including geo-location
monitoring and control (geo-fencing), extending trust to workloads, the protected launch
of workloads and ensuring run time integrity of workloads and data.
The cloud presents a much more dynamic environment than previous operating
environments, including consolidated virtualized environments. For instance, virtual
machines may get migrated for performance or business reasons, and within the
framework of secure launch, it is imperative to provide security for these virtual machines
and their data while they move and where they land. This leads to the notion of trusted
compute pools.
Security aspects for networks comes next. One aspect left to be developed is the
role of hardened network appliances taking advantage of secure launch to complement
present safe practices. Identity management is an ever present challenge due to the
distributed nature of the cloud, more so than its prior incarnation in grid computing
because distribution, multi-tenancy and dynamic behaviors are carried out well beyond
the practices of grid computing.
Along with the conceptual discussions we sprinkle in a number of case studies in
the form of proofs of concept and even a few deployments by forward thinking service
providers. For the architects integrating a broad range of technology components beyond
those associated with the secure launch foundation these projects provides invaluable
proofs of existence, an opportunity to identify technology and interface gaps and to
provide very precise feedback to standards organizations. This will help accelerate the
technology learning curve for the industry as a whole, enabling a rapid reduction in the
cost and time to deploy specific implementations.
The compute side is only one aspect of cloud. We’ll need to figure out how to extend
this protection to the network and storage capabilities in the cloud. The experience of
building a trust chain starting from a secure boot foundation helps: network and storage
appliances also run on the same components used to build servers. We believe that if
we follow the same rigorous approach used to build a compute trust chain, it should be
possible to harden network and storage devices to the same degree we attained with the
compute subsystem. From this perspective the long journey is beginning to look more
than like a trailblazing path.
Some readers will shrewdly note that the IT infrastructure in data centers
encompasses more than servers; it also includes networks and storage equipment. The
security constructs discussed in this book relate mostly to application stacks running
on server equipment, and they are still evolving. It must be noted that network and
storage equipment also runs on computing equipment, and therefore one strategy
for securing network and storage equipment will be precisely to build analogous trust
chains applicable to the equipment. These topics are beyond the scope of this book but
are certainly relevant to industry practitioners and therefore are excellent subjects for
subject-matter experts to document in future papers and books.
xxvii
www.it-ebooks.info
■ Introduction
The authors acknowledge the enormous amount of work still to be done, but by
the same token, these are enormously exciting areas to explore, with the potential of
delivering equally enormous value to a beleaguered security industry—an industry that
has been rocked by a seemingly endless stream of ever-more sophisticated and brazen
exploits. We invite industry participants in any role, whether executive, architecture,
engineering, system integration, or development, to join us in broadening this path.
Actually, the path to innovation will never end—this is the essence of security. However,
along the way, industry participants will build a much more robust foundation to the
cloud, bringing some well-deserved assurances to customers.
xxviii
www.it-ebooks.info
Chapter 1
In this chapter we go through some basic concepts with the purpose of providing context
for the discussions in the chapters that follow. Here, we review briefly the concept of the
cloud as defined by the U.S. National Institute of Standards and Technology, and the
familiar terms of IaaS, PaaS, and SaaS under the SPI model. What is not often discussed is
that the rise of cloud computing comes from strong historical motivations and addresses
shortcomings of predecessor technologies such as grid computing, the standard enterprise
three-tier architecture, or even the mainframe architecture of many decades ago.
From a security perspective, the main subjects for this book—perimeter and
endpoint protection—were pivotal concepts in security strategies prior to the rise of
cloud technology. Unfortunately these abstractions were inadequate to prevent recurrent
exploits, such as leaks of customer credit card data, even before cloud technology
became widespread in the industry. We’ll see in the next few pages that, unfortunately
for this approach, along with the agility, scalability, and cost advantages of the cloud,
the distributed nature of these third-party-provided services also introduced new risk
factors. Within this scenario we would like to propose a more integrated approach to
enterprise security, one that starts with server platforms in the data center and builds
to the hypervisor operating system and applications that fall under the notion of trusted
compute pools, covered in the chapters that follow.
1
Peter Mell and Timothy Grance, The NIST Definition of Cloud Computing. NIST Special Publication
800-145, September 2011.
2
Security Guidance for Critical Areas of Focus in Cloud Computing, Cloud Security Alliance,
rev. 2.1 (2009).
www.it-ebooks.info
CHAPTER 1 ■ Cloud Computing Basics
The model consists of three main layers (see Figure 1-1), laid out in a top-down
fashion: global essential characteristics that apply to all clouds, the service models by
which cloud services are delivered, and how the services are instantiated in the form of
deployment models. There is a reason for this structure that’s rooted in the historical
evolution of computer and network architecture and in the application development and
deployment models. Unfortunately most discussions of the cloud gloss over this aspect.
We assume readers of this book are in a technology leadership role in their respective
fields, and very likely are influential in the future direction of cloud security. Therefore, an
understanding of the dynamics of technology evolution will be helpful for the readers in
these strategic roles. For this purpose, the section that follows covers the historical context
that led to the creation of the cloud.
www.it-ebooks.info
CHAPTER 1 ■ Cloud Computing Basics
Cloud applications are inherently distributed, and hence they are necessarily
delivered over a network. The largest applications may involve millions of users, and
the conveyance method is usually the Internet. An example is media delivery through
Netflix, using infrastructure from Amazon Web Services. Similarly, cloud applications are
expected to have automated interfaces for setup and administration. This usually means
they are accessible on demand through a self-service interface. This is usually the case, for
instance, with email accounts through Google Gmail or Microsoft Outlook.com.
With the self-service model, it is imperative to establish methods for measuring
service. This measuring includes guarantees of service provider performance,
measurement of services delivered for billing purposes, and very important from the
perspective of our discussion, measurement of security along multiple vectors. The
management information exchanged between a service provider and consumers is
defined as service metadata. This information may be facilitated by auxiliary services or
metaservices.
The service provider needs to maintain a service pool large enough to address
the needs of the largest customer during peak demand. The expectation is that, with
a large customer base, most local peaks and valleys will cancel out. In order to get the
same quality of service (QoS), an IT organization would need to size the equipment for
expected peak demand, leading to inefficient use of capital. Under some circumstances,
large providers can smooth out even regional peaks and valleys by coordinating their
geographically disperse data centers, a luxury that mid-size businesses might not be able
to afford.
The expectation for cloud users, then, is that compute, network, and data resources
in the cloud should be provided on short order. This property is known as elasticity. For
instance, virtual machines should be available on demand in seconds, or no more than
minutes, compared to the normal physical server procurement process that could take
anywhere from weeks to years.
At this point, we have covered the what question—namely, the essential
characteristics of the cloud. The next section covers service models, which is essentially
the how question.
www.it-ebooks.info
CHAPTER 1 ■ Cloud Computing Basics
how a pool of physical hosts is able to support 500 or more virtual machines each. Some
providers may provide additional guarantees—for instance, physical hosts shared with no
one else or direct access to a physical host from a pool of hosts.
The bottom layer of the NIST framework addresses where cloud resources are
deployed, which is covered in the next section.
www.it-ebooks.info
CHAPTER 1 ■ Cloud Computing Basics
www.it-ebooks.info
CHAPTER 1 ■ Cloud Computing Basics
compliance. Covering this topic is the objective for this book. The new perimeter is
defined in terms of data, its location, and the cloud resources processing it, given that the
old definition of on-premise assets no longer applies.
Let’s now explore some of the historical drivers of the adoption of cloud technology.
Historical Context
Is it possible to attain levels of service in terms of security, reliability, and performance
for cloud-based applications that rival implementations using corporate-owned
infrastructure? Today it is challenging not only to achieve this goal but also to measure
that success except in a very general sense. For example, consider doing a cost rollup at
the end of a fiscal year. There’s no capability today to establish operational metrics and
service introspection. A goal for security in the cloud, therefore, is not to just match this
baseline but to surpass it. In this book, we’d like to claim that is possible.
Cloud technology enables the disaggregation of compute, network, and storage
resources in a data center into pools of resources, as well as the partitioning and
re-aggregation of these resources according to the needs of consumers down the supply
chain. These capabilities are delivered through a network, as explained earlier in the
chapter. A virtualization layer may be used to smooth out the hardware heterogeneity and
enable configurable software-defined data centers that can deliver a service at a quality
level that is consistent with a pre-agreed SLA.
The vision for enterprise IT is to be able to run varied workloads on a software-defined
data center, with ability for developers, operators, or in fact, any responsible entity to use
self-service unified management tools and automation software. The software-defined
data center must be abstracted from, but still make best use of, physical infrastructure
capability, capacity, and level of resource consumption across multiple data centers and
geographies. For this vision to be realized, it is necessary that enterprise IT have products,
tools, and technologies to provision, monitor, remediate, and report on the service level
of the software-defined data center and the underlying physical infrastructure.
www.it-ebooks.info
CHAPTER 1 ■ Cloud Computing Basics
While the traditional three-tier architecture did fine in the scalability department, it
was not efficient in terms of cost and asset utilization, however. This was because of the
reality of procuring a physical asset. If new procurement needs to go through a budgetary
cycle, the planning horizon can be anywhere from six months to two years. Meanwhile,
capacity needs to be sized for the expected peak demand, plus a generous allowance
for demand growth over the system’s planning and lifecycle, which may or may not
be realized. This defensive practice leads to chronically low utilization rates, typically
in the 5 to 15 percent range. Managing infrastructure in this overprovisioned manner
represents a sunk investment, with a large portion of the capacity not used during most
of the infrastructure’s planned lifetime. The need for overprovisioning would be greatly
alleviated if supply could somehow be matched with demand in terms of near-real
time—perhaps on a daily or even an hourly basis.
Server consolidation was a technique adopted in data centers starting in the early
2000s, which addressed the low-utilization problem using virtualization technology to
pack applications into fewer physical hosts. While server consolidation was successful at
increasing utilization, it brought significant technical complexity and was a static scheme,
as resource allocation was done only at planning or deployment time. That is, server
consolidation technology offered limited flexibility in changing the machine allocations
during operations, after an application was launched. Altering the resource mix required
significant retooling and application downtime.
www.it-ebooks.info
CHAPTER 1 ■ Cloud Computing Basics
■■Note Cloud computing has multiplied the initial gains in efficiency delivered by server
consolidation by allowing dynamic rebalancing of workloads at run time, not just at planning
or deployment time.
The initial state of IT applications circa 2000 ran in stovepipes, shown in Figure 1-3
on the left, with each application running on assigned hardware. Under cloud computing,
capabilities common across multiple stacks, such as the company’s employee database,
are abstracted out in the form of a service or of a limited number of service instances that
would certainly be smaller than the number of application instances. All applications
needing access to the employee database, for instance, get connected to the employee
database service.
www.it-ebooks.info
CHAPTER 1 ■ Cloud Computing Basics
With that said, we have an emerging service ecosystem with composite applications
that are freely using both internally and third-party servicelets. A strong driver for this
application architecture has been the consumerization of IT and the need to make
existing corporate applications available through mobile devices.
For instance, front-end services have gone through a notable evolution, whereby
the traditional PC web access has been augmented to enable application access
through mobile devices. A number of enterprises have opened applications for public
access, including travel reservation systems, supply chain, and shopping networks. The
capabilities are accessible to third-party developers through API managers that make it
relatively easy to build mobile front ends to cloud capabilities; this is shown in Figure 1-4.
A less elegant version of this scheme is the “lipstick on a pig” approach of retooling
a traditional three-tier application and slapping a REST API on top, to “servitize” the
application and make it accessible as a component for integration into other third-party
applications. As technology evolves, we can expect more elegantly architected servicelets
built from the ground up to function as such.
So, in Figure 1-4 we see a composite application with an internal API built out of
four on-premise services hosted in an on-premise private cloud, the boundary marked
by the large, rounded rectangle. The application uses four additional services offered by
third-party providers and possibly hosted in a public cloud. A fifth service, shown in the
lower right corner, uses a third-party private cloud, possibly shared with other corporate
applications from the same company.
Continuing on the upper left corner of Figure 1-4, note the laptop representing a
client front end for access by nomadic employees. The mobile device on the lower left
represents a mobile app developed by a third-party ISV accessing another application API
posted through an API manager. An example of such an application could be a company’s
e-commerce application. The mobile app users are the company’s customers, able to
check stock and place purchase orders. However, API calls for inventory restocking and
visibility into the supply chain are available only through the internal API. Quietly, behind
the scenes, the security mechanisms to be discussed in the following chapters are acting
to ensure the integrity of the transactions throughout.
www.it-ebooks.info
CHAPTER 1 ■ Cloud Computing Basics
■■Note An important consideration is that the cloud needs to be seen beyond just a
drop-in replacement for the old stovepipes. This strategy of using new technology to
re-implement existing processes would probably work, but can deliver only incremental
benefits, if any at all. The cloud represents a fundamental change in how IT gets done and
delivered. Therefore, it also presents an opportunity for making a clean break with the
past, bringing with it the potential for a quantum jump in asset utilization and, as we hope
to show in this book, in greater security.
10
www.it-ebooks.info
CHAPTER 1 ■ Cloud Computing Basics
On the last point, virtually all service offerings available today are not only opaque
when it comes to providing quantifiable QoS but, when it comes to QoS providers, they
also seem to run in the opposite direction of customer desires and interests. Typical
messsages, including those from large, well-known service providers, have such
unabashed clauses as the following:
“Your access to and use of the services may be suspended . . .
for any reason . . .”
“We will not be liable for direct, indirect or consequential
damages . . .”
“The service offerings are provided ‘as is’ . . . ”
“We shall not be responsible for any service interruptions . . . ”
These customer agreements are written from the perspective of the service provider.
The implicit message is that the customer comes as second priority, and the goal of
the disclaimers is to protect the provider from liability. Clearly, there are supply gaps
in capabilities and unmet customer needs with the current service offerings. Providers
addressing the issue head on, with an improved ability to quantify their security risks and
the capability of providing risk metrics for their service products, will have an advantage
over their competition, even if their products are no more reliable than comparable
offerings. We hope the trusted cloud methods discussed in the following chapters will
help providers deliver a higher level of assurance in differentiated service offerings. We’d
like to think that these disclaimers reflect service providers’ inability, considering the
current state of the art, to deliver the level of security and performance needed, rather
than any attempts to dodge the issue.
Given that most enterprise applications run on servers installed in data centers, the
first step is to take advantage of the sensors and features already available in the server
platforms. The next chapters will show how, through the use of Intel Trusted Execution
Technology (TXT) and geolocation sensors, it is possible to build more secure platforms.
11
www.it-ebooks.info
CHAPTER 1 ■ Cloud Computing Basics
Security as a Service
What would be a practical approach to handling security in a composite application
environment? Should it be baked-in—namely, every service component handling its own
security—or should it be bolted on after integration? As explained above, we call these
service components servicelets, designed primarily to function as application building
blocks rather than as full-fledged, self-contained applications.
Unfortunately, neither approach constitutes a workable solution. A baked-in
approach requires the servicelet to anticipate every possible circumstance for every
customer during the product’s lifetime. This comprehensive approach may be overkill
for most applications. It certainly burdens with overwrought security features the service
developer trying to quickly bring a lightweight product to market. The developer may see
this effort as a distraction from the main business. Likewise, a bolted-on approach makes
it difficult both to retrofit security on the servicelet and to implement consistent security
policies across the enterprise.
One possible approach out of this maze is to look at security as a horizontal
capability, to be handled as another service. This approach assumes the notion of a
virtual enterprise service boundary.
12
www.it-ebooks.info
CHAPTER 1 ■ Cloud Computing Basics
Existing Enterprise
Information Systems
Virtualized
Infrastructure
End User
13
www.it-ebooks.info
CHAPTER 1 ■ Cloud Computing Basics
The next step in sophistication is the hybrid cloud, shown in Figure 1-6. A hybrid
cloud constitutes the more common example of an enterprise using an external cloud
service in a targeted manner for a specific business need. This model is hybrid because the
core business services are left in the enterprise perimeter, and some set of cloud services
are selectively used for achieving specific business goals. There is additional complexity, in
that we have third-party servicelets physically outside the traditional enterprise perimeter.
Existing Enterprise
Information Systems
The last stage of sophistication comes with the use of public clouds, shown in
Figure 1-7. Using public clouds brings greater rewards for the adoption of cloud
technology, but also greater risks. In its pure form, unlike the hybrid cloud scenario,
the initial on-premise business core may become vanishingly small. Only end users
remain in the original perimeter. All enterprise services may get offloaded to external
cloud providers on a strategic and permanent basis. Application components become
externalized, physically and logically.
Existing Enterprise
Information Systems
14
www.it-ebooks.info
CHAPTER 1 ■ Cloud Computing Basics
Yet another layer of complexity is the realization that the enterprise security
perimeter as demarcation for an IT fortress was never a realistic concept. For instance,
allowing employee access to the corporate network through VPN is tantamount to
extending a bubble of the internal network to the worker in the field. However, in
practical situations, that perimeter must be semipermeable, allowing a bidirectional flow
of information.
A case in point is a company’s website. An initial goal may have been to provide
customers with product support information. Beyond that, a CIO might be asked to
integrate the website into the company’s revenue model. Examples might include
supply-chain integration: airlines making their scheduling and reservation systems,
or hotel chains publishing available rooms, not only for direct consumption through
browsers but also as APIs for integration with other applications. Any of these extended
capabilities will have the effect of blurring the security boundaries by bringing in external
players and entities.
If anything, the fundamental security concerns that existed with IT delivered out of
corporate-owned assets also apply when IT functions, processes, and capabilities migrate
to the cloud. The biggest challenge is to define, devise, and carry out these concepts
into the new cloud-federated environment in a way that is more or less transparent to
the community of users. An added challenge is that, because of the broader reach of the
cloud, the community of users expands by several orders of magnitude. A classic example
is the airline reservation system, such as the AMR Sabre passenger reservation system,
later spun out as an independent company. Initially it was the purview of corporate staff.
Travel agents in need of information or making reservations phoned to access the airline
information indirectly. Eventually travel agents were able to query and make reservations
directly. Under the self-service model of the cloud today, it is customary for consumers
to make reservations themselves through dozens of cloud-based composite applications
using web-enabled interfaces from personal computers and mobile devices.
Indeed, security imperatives have not changed in the brave new world of cloud
computing. Perimeter management was an early attempt at security management, and it
is still in use today. The cloud brings new challenges, though, such as the nosy neighbor
problem mentioned earlier. To get started in the cloud environments, the concept of
trust in a federated environment needs to be generalized. The old concept of inside vs.
outside the firewall has long been obsolete and provides little comfort. On the one hand,
the federated nature of the cloud brings the challenge of ensuring trust across logically
and geographically distributed components. On the other hand, we believe that the goal
for security in the cloud is to match current levels of security in the enterprise, preferably
by removing some of the outstanding challenges. For instance, the service abstraction
15
www.it-ebooks.info
CHAPTER 1 ■ Cloud Computing Basics
used internally provides additional opportunities for checks and balances in terms of
governance, risk management, and compliance (GRC) not possible in earlier monolithic
environments.
We see this transition as an opportunity to raise the bar, as is expected when any
new technology displaces the incumbent. Two internal solution components may
trust each other, and therefore their security relationships are said to be implicit. If
these components become servicelets, the implicit relationship becomes explicit:
authentication needs to happen and trust needs to be measured. If these actions can’t be
formalized, though, the provider does not deliver what the customer wants. The natural
response from the provider is to put liability-limiting clauses in place of an SLA. Yet there
is trouble when the state-of-the-art can’t provide what the customer wants. This inability
by service providers to deliver security assurances leads to the brazen disclaimers
mentioned above.
Significant progress has been achieved in service performance management. Making
these contractual relationships explicit in turn makes it possible to deliver predictable
cost and performance in ways that were not possible before. This dynamic introduces the
notion of service metadata, described in Chapter 10. We believe security is about to cross
the same threshold. As we’ve mentioned, this is the journey we are about to embark on
during the next few chapters.
The transition from a corporate-owned infrastructure to a cloud technology poses
a many-layered challenge: every new layer addressed then brings a fresh one to the fore.
Today we are well past the initial technology viability objections, and hence the challenge
du jour is security, with security cited as a main roadblock on the way to cloud adoption.
16
www.it-ebooks.info
CHAPTER 1 ■ Cloud Computing Basics
Chapter 7 considers issues of identity management in the cloud. And Chapter 8 discusses
the idea of identity in a federated environment. The latter is not a new problem; federated
identity management was an important feature of the cloud’s predecessor technology,
grid computing. However, as we’ll show, considerations of federation for the cloud are
much different.
Summary
We started this chapter with a set of commonly understood concepts. We also observed
the evolution of security as IT made of corporate-owned assets to that of augmented with
externalized resources. The security model also evolved from an implicit, essentially
“security by obscurity” approach involving internal assets to one that is explicit across
assets crossing corporate boundaries. This federation brings new challenges, but it also
has the possibility of raising the bar in terms of security for corporate applications. This
new beginning can be built upon a foundation of trusted cloud infrastructure, which is
discussed in the rest of this book.
17
www.it-ebooks.info
Chapter 2
In Chapter 1 we reviewed the essential cloud concepts and took a first look at cloud
security. We noted that the traditional notion of perimeter or endpoint protection
left much to be desired in the traditional architecture with enterprise-owned
assets. Such a notion is even less adequate today when we add the challenges
that application developers, service providers, application architects, data center
operators, and users face in the emerging cloud environment.
In this chapter we’ll bring the level of discourse one notch tighter and focus
on defining the issues that drive cloud security. We’ll go through a set of initial
considerations and common definitions as prescribed by industry standards. We’ll also
look at current pain points in the industry regarding security and the challenges involved
in addressing those pains.
Beyond these considerations, we first take a look at the solution space: the concept
of a trusted infrastructure and usages to be implemented in a trusted cloud, starting
with a trust chain that consists of hardware that supports boot integrity. Then, we take
advantage of that trust chain to implement data protection, equally at rest and in motion
and during application execution, to support application run-time integrity and offer
protection in the top layer.
Finally, we look briefly at some of the “to be” scenarios for users who are able to put
these recommendations into practice.
19
www.it-ebooks.info
CHAPTER 2 ■ The Trusted Cloud: Addressing Security and Compliance
requirements must be met, whether deployment uses a dedicated service available via a
private cloud or is a service shared with other subscribers via a public cloud. There’s no
margin for error when it comes to security. According to a research study conducted by
the Ponemon Institute and Symantec, the average cost to an organization of a data breach
in 2013 was $5.4 million, and the corresponding cost of lost business came to about
$3 million.1 It is the high cost of such data breaches and the inadequate security monitoring
capabilities offered as part of the cloud services that pose the greatest threats to wider
adoption of cloud computing and that create resistance within organizations to public
cloud services.
From an IT manager’s perspective, cloud computing architectures bypass or work
against traditional security tools and frameworks. The ease with which services are
migrated and deployed in a cloud environment brings significant benefits, but they
are a bane from a compliance and security perspective. Therefore, this chapter focuses
on the security challenges involved in deploying and managing services in a cloud
infrastructure. To serve as an example, we describe work that Intel is doing with partners
and the software vendor ecosystem to enable a security-enhanced platform and solutions
with security anchored and rooted in hardware and firmware. The goal of this effort is to
increase security visibility and control in the cloud.
Cloud computing describes the pooling of an on-demand, self-managed virtual
infrastructure, consumed as a service. This approach abstracts applications from the
complexity of the underlying infrastructure, allowing IT to focus on enabling greater
business value and innovation instead of getting bogged down by technology deployment
details. Organizations welcome the presumed cost savings and business flexibility
associated with cloud deployments. However, IT practitioners unanimously cite
security, control, and IT compliance as primary issues that slow the adoption of cloud
computing. These considerations often denote general concerns about privacy, trust,
change management, configuration management, access controls, auditing, and logging.
Many customers also have specific security requirements that mandate control over data
location, isolation, and integrity. These requirements have traditionally been met through
a fixed hardware infrastructure.
At the current state of cloud computing, the means to verify a service’s compliance
are labor-intensive, inconsistent, non-scalable, or just plain impractical to implement.
The necessary data, APIs, and tools are not available from the provider. Process
mismatches occur when service providers and consumers work under different
operating models. For these reasons, many corporations deploy less critical applications
in the public cloud and restrict their sensitive applications to dedicated hardware
and traditional IT architecture running in a corporate-owned vertical infrastructure.
For business-critical applications and processes, and for sensitive data, third-party
attestations of security controls usually aren’t enough. In such cases, it is absolutely
critical for organizations to be able to ascertain that the underlying cloud infrastructure is
secure enough for the intended use.
1
https://www4.symantec.com/mktginfo/whitepaper/053013_GL_NA_WP_Ponemon-2013-
Cost-of-a-Data-Breach-Report_daiNA_cta72382.pdf
20
www.it-ebooks.info
CHAPTER 2 ■ The Trusted Cloud: Addressing Security and Compliance
This requirement thus drives the next frontier of cloud security and compliance:
implementing a level of transparency at the lowest layers of the cloud, through the
development of standards, instrumentation, tools, and linkages to monitor and prove
that the IaaS cloud’s physical and virtual servers are actually performing as they should
be and that they meet defined security criteria. The expectation is that the security of a
cloud service should match or exceed the equivalent in house capabilities before it can be
considered an appropriate replacement.
Today, security mechanisms in the lower stack layers (for example, hardware,
firmware, and hypervisors) are almost absent. The demand for security is higher for
externally sourced services. In particular, the requirements for transparency are higher:
while certain monitoring and logging capabilities might not have been deemed necessary
for an in-house component, they become absolute necessities when sourced from
third parties to support operations, meet SLA compliance, and have audit trails should
litigation and forensics become necessary. On the positive side, the use of cloud services
will likely drive the re-architecturing of crusty applications with much higher levels of
transparency and scalability with, we hope, moderate cost impact due to the greater
efficiency the cloud brings.
Cloud providers and the IT community are working earnestly to address these
requirements, allowing cloud services to be deployed and managed with predictable
outcomes, with controls and policies in place to monitor trust and compliance of these
services in cloud infrastructures. Specifically, Intel Corporation and other technology
companies have come together to enable a highly secure cloud infrastructure based on
a hardware root of trust, providing tamper-proof measurements of physical and virtual
components in the computing stack, including hypervisors. These collaborations are
working to develop a framework that integrates the secure hardware measurements
provided by the hardware root of trust with adjoining virtualization and cloud
management software. The intent is to improve visibility, control, and compliance for
cloud services. For example, making the trust and integrity of the cloud servers visible
will allow cloud orchestrators to provide improved controls of on boarding services for
their more sensitive workloads, offering more secure hardware and subsequently better
control over the migration of workloads and greater ability to deliver on security policies.
Security requirements for cloud use are still works in progress, let alone firming
up the security aspects proper. Let’s look at some of the security issues being captured,
defined, and specified by the government and standards organizations.
21
www.it-ebooks.info
CHAPTER 2 ■ The Trusted Cloud: Addressing Security and Compliance
Here are some important considerations dominating the current work on cloud
security:
22
www.it-ebooks.info
CHAPTER 2 ■ The Trusted Cloud: Addressing Security and Compliance
23
www.it-ebooks.info
CHAPTER 2 ■ The Trusted Cloud: Addressing Security and Compliance
property, or financial data. The risks (and costs) of non-compliance continue to grow.
The Federal Information Security Management Act (FISMA) and the Federal Risk
and Authorization Management Program (FedRAMP) are two examples of how non-
compliance prevents the cloud service providers from competing in the public sector.
But even if cloud providers aren’t planning to compete in the public sector by offering
government agencies their cloud services, it’s still important that they have at least a basic
understanding of both programs. That’s because the federal government is the largest
single producer, collector, consumer, and disseminator of information in the United
States. Any changes in regulatory requirements that affect government agencies will also
have the potential of significantly affecting the commercial sector. These trends have
major bearing on the security and compliance challenges that organizations face as they
consider migrating their workloads to the cloud.
As mentioned, corporate-owned infrastructure can presumably provide a security
advantage by virtue of its being inside the enterprise perimeter. The first defense is
security by obscurity. Resources inside the enterprise, especially inside a physical
perimeter, are difficult for intruders to reach. The second defense is genetic diversity.
Given that IT processes vary from company to company, an action that breaches one
company’s security may not work for another company’s. However, these presumed
advantages are unintended, and therefore difficult to quantify; in practice, they offer little
comfort or utility.
24
www.it-ebooks.info
CHAPTER 2 ■ The Trusted Cloud: Addressing Security and Compliance
S. Curry, J. Darbyshire, Douglas Fisher, et al., RSA Security Brief, March 2010. Also, T. Ristenpart,
2
E. Tromer, et al., Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party
Compute Clouds, CCS’09, Chicago.
25
www.it-ebooks.info
CHAPTER 2 ■ The Trusted Cloud: Addressing Security and Compliance
Trusted Clouds
There are many definitions and industry descriptions for the term trusted cloud, but at the
core these definitions all have four foundational pillars:
• A trusted computing infrastructure
• A trusted cloud identity and access management
• Trusted software and applications
• Operations and risk management
Each of these pillars is broad and goes deep, with a rich cohort of technologies,
patterns of development, and of course security considerations. It is not possible to cover
all of them in one book. Since this book deals with the infrastructure for cloud security,
we focus on the first pillar, the trusted infrastructure, and leave the others for future
work. (Identity and access management are covered very briefly within the context of
the trusted infrastructure.) But before we delve into this subject, let’s review some key
security concepts to ensure clarity in the discussion. These terms lay the foundation for
what visibility, compliance, and monitoring entail, and we start with baseline definitions
for trust and assurance.
• Trust. The assurance and confidence that people, data, entities,
information, and processes will function or behave in expected
ways. Trust may be human-to-human, machine-to-machine
(e.g., handshake protocols negotiated within certain protocols),
human-to-machine (e.g., when a consumer reviews a digital
signature advisory notice on a website), or machine-to-human.
At a deeper level, trust might be regarded as a consequence of
progress toward achieving security or privacy objectives.
26
www.it-ebooks.info
CHAPTER 2 ■ The Trusted Cloud: Addressing Security and Compliance
27
www.it-ebooks.info
CHAPTER 2 ■ The Trusted Cloud: Addressing Security and Compliance
With the use of hardware as the initial root of trust, you can then measure (which
means taking a hash, like an MD5 or SHA1, of the image of component or components)
the software, such as the hypervisor or operating system, to determine whether
unauthorized modifications have been made to it. In this way, a chain of trust relative
to the hardware can be established. Trust techniques include hardware encryption,
signing, machine authentication, secure key storage, and attestation. Encryption and
signing are well-known techniques, but these are hardened by the placement of keys in
protected hardware storage. Machine authentication provides a user with a higher level
of assurance, as the machine is indicated as known and authenticated. Attestation, which
is covered in Chapter 4, provides the means for a third party (also called a trusted third
party) to affirm that loaded firmware and software are correct, true, or genuine. This is
particularly important for cloud architectures based on virtualization.
28
www.it-ebooks.info
CHAPTER 2 ■ The Trusted Cloud: Addressing Security and Compliance
VMs/Workloads
29
www.it-ebooks.info
CHAPTER 2 ■ The Trusted Cloud: Addressing Security and Compliance
30
www.it-ebooks.info
CHAPTER 2 ■ The Trusted Cloud: Addressing Security and Compliance
Given the crucial role played by the hypervisor as essential software responsible
for managing the underlying hardware and allocating resources such as processor,
disk, memory, and I/O to the guest virtual machines and arbitrating the accesses and
privileges among guests, it is imperative to have the highest levels of assurance so that it
is uncompromised. This was the rationale for conducting the survey shown in Figure 2-2.
With this growing awareness and concern has come a corresponding growth in vendors
looking to define the solutions.
Figure 2-2. Survey results showing concerns over hypervisor integrity across regions
For the various devices/nodes across the infrastructure domains (compute, storage,
and network), the integrity of the pre-launch and launch environment can be asserted
anytime during the execution’s lifecycle. This is done by verifying that the identity and
values of the components have not changed unless there has been a reset or a reboot of
the platform by the controlling software. This assertion of integrity is deferred to a trusted
third party that fulfills the role of a trust authority, and the verification process is known
as trust attestation. The trust authority service is an essential component of a trusted
cloud solution architecture.
31
www.it-ebooks.info
CHAPTER 2 ■ The Trusted Cloud: Addressing Security and Compliance
of the launch environment. However, no specific claims can be made about the virtual
machines being launched, other than indicating that they are being launched on a
measured and attested hypervisor platform. Although virtual machine monitors (VMM)
or hypervisors are naturally good at isolating workloads from each other because they
mediate all access to physical resources by virtual machines, they cannot by themselves
attest and assert the state of the virtual machine that is launched.
The trusted virtual machine launch usage model applies the same level of trust-
ability to the pre-launch and launch environment of the virtual machines and workloads.
Each virtual machine launched on a virtual machine manager and hypervisor platform
benefits from a hardware root of trust by storing the launch measurements of the virtual
machines’ sealing and remote attestation capabilities. However, this requires virtualizing
the TPM, with a virtual TPM (vTPM) for each of the virtual machines. Each of these
virtual TPM vTPM instances then emulates the functions of a hardware TPM. Currently,
there are no real virtualized TPM implementations available, owing to the challenges
related to virtualizing the TPM. The difficulty lies not in providing the low-level TPM
instructions but in ensuring that the security properties are supported and established
with an appropriate level of trust. Specifically, we have to extend the chain of trust from
the physical TPM to each virtual TPM by carefully managing the signing keys, certificates,
and lifecycle of all necessary elements. An added dimension is the mobility of the virtual
machines and how these virtual TPMs would migrate with the virtual machines.
There are other ways of enabling a measured launch of virtual machines, such as
storing the measurements in memory as part of a trusted hypervisor platform without
the use of virtual TPMs but still ensuring that the chain of trust is extended from the
physical TPM. Irrespective of the design approach, day-to-day operations on virtual
machines—such as suspend and resume, creating snapshots of running virtual machines,
and playing them back on other platforms or live migration of virtual machines—become
challenging to implement.
There are no real production-quality implementations of these architectures.
There are few academic and research implementations of vTPMs and other memory
structure–based approaches, each with its own pros and cons. Trusted virtual machine
usages are still evolving at the time of this writing; hence it’s not possible to be definitive.
Chapter 8 covers aspects of the measured VM launch and some architectural elements.
Chapter 3 covers in depth the matter of boot integrity and trusted boot of platforms and
the hypervisors, as well as the associated trusted compute pools concept that aggregates
systems so specific policies can be applied to those pools. The discussion also includes
the solution architecture, and a snapshot of industry efforts to support the enabling
of trusted compute pools. Chapter 4 covers the trust attestation or remote attestation
architecture, including a reference implementation.
32
www.it-ebooks.info
Random documents with unrelated
content Scribd suggests to you:
1.E.6. You may convert to and distribute this work in any binary,
compressed, marked up, nonproprietary or proprietary form,
including any word processing or hypertext form. However, if you
provide access to or distribute copies of a Project Gutenberg™ work
in a format other than “Plain Vanilla ASCII” or other format used in
the official version posted on the official Project Gutenberg™ website
(www.gutenberg.org), you must, at no additional cost, fee or expense
to the user, provide a copy, a means of exporting a copy, or a means
of obtaining a copy upon request, of the work in its original “Plain
Vanilla ASCII” or other form. Any alternate format must include the
full Project Gutenberg™ License as specified in paragraph 1.E.1.
• You pay a royalty fee of 20% of the gross profits you derive from
the use of Project Gutenberg™ works calculated using the
method you already use to calculate your applicable taxes. The
fee is owed to the owner of the Project Gutenberg™ trademark,
but he has agreed to donate royalties under this paragraph to
the Project Gutenberg Literary Archive Foundation. Royalty
payments must be paid within 60 days following each date on
which you prepare (or are legally required to prepare) your
periodic tax returns. Royalty payments should be clearly marked
as such and sent to the Project Gutenberg Literary Archive
Foundation at the address specified in Section 4, “Information
about donations to the Project Gutenberg Literary Archive
Foundation.”
• You comply with all other terms of this agreement for free
distribution of Project Gutenberg™ works.
1.F.
1.F.4. Except for the limited right of replacement or refund set forth in
paragraph 1.F.3, this work is provided to you ‘AS-IS’, WITH NO
OTHER WARRANTIES OF ANY KIND, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR ANY PURPOSE.
Please check the Project Gutenberg web pages for current donation
methods and addresses. Donations are accepted in a number of
other ways including checks, online payments and credit card
donations. To donate, please visit: www.gutenberg.org/donate.
Most people start at our website which has the main PG search
facility: www.gutenberg.org.
Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.
ebookfinal.com